Back to bug 2152652

Who When What Removed Added
Marian Rehak 2022-12-12 15:48:58 UTC CC security-response-team
Sandipan Roy 2022-12-13 04:23:16 UTC Depends On 2152789, 2152790
Sandipan Roy 2022-12-21 09:07:45 UTC Doc Text A vulnerability was found in curl. By this security flaw, curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
Group qe_staff, security
Summary EMBARGOED CVE-2022-43552 curl: HTTP Proxy deny use-after-free CVE-2022-43552 curl: HTTP Proxy deny use-after-free
Deadline 2022-12-21
Sandipan Roy 2022-12-21 09:08:08 UTC Depends On 2155435, 2155436
RaTasha Tillery-Smith 2022-12-21 15:26:45 UTC Doc Text A vulnerability was found in curl. By this security flaw, curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path. A vulnerability was found in curl. In this issue, curl can be asked to tunnel all protocols virtually it supports through an HTTP proxy. HTTP proxies can deny these tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific SMB or TELNET protocols, curl can use a heap-allocated struct after it has been freed and shut down the code path in its transfer.
Sandipan Roy 2023-01-05 15:53:45 UTC Depends On 2158513
Tomas Hoger 2023-01-25 07:26:59 UTC Summary CVE-2022-43552 curl: HTTP Proxy deny use-after-free CVE-2022-43552 curl: Use-after-free triggered by an HTTP proxy deny response
Kazu Yoshida 2023-02-13 11:29:35 UTC CC kyoshida
errata-xmlrpc 2023-05-09 07:52:11 UTC Link ID Red Hat Product Errata RHSA-2023:2478
errata-xmlrpc 2023-05-16 08:35:14 UTC Link ID Red Hat Product Errata RHSA-2023:2963
errata-xmlrpc 2023-06-05 11:47:04 UTC Link ID Red Hat Product Errata RHSA-2023:3355
errata-xmlrpc 2023-06-05 11:50:54 UTC Link ID Red Hat Product Errata RHSA-2023:3354
Product Security DevOps Team 2023-06-05 18:17:18 UTC Resolution --- ERRATA
Status NEW CLOSED
Last Closed 2023-06-05 18:17:18 UTC

Back to bug 2152652